摘要:
Techniques are disclosed for concurrently maintaining serialized objects that were created from more than one version of a class definition. According to preferred embodiments, a component maps and enforces multiple valid stream-unique version identifiers (“SUIDs”) for a collection of class definitions (such as the classes of a software product that is undergoing change from one version to another). This component programmatically detects when an object's SUID value does not match the code attempting to deserialize the object, and then programmatically determines whether the object is compatible with the code even though the SUID values do not match. Preferably, this determination is made by consulting a stored mapping, in which the SUIDs of compatible versions have been recorded.
摘要:
Maintaining Multiple Valid Concurrent Serialized Object Versions Techniques are disclosed for concurrently maintaining serialized objects that were created from more than one version of a class definition. According to preferred embodiments, a component maps and enforces multiple valid stream-unique version identifiers (“SUIDs”) for a collection of class definitions (such as the classes of a software product that is undergoing change from one version to another). This component programmatically detects when an object's SUID value does not match the code attempting to deserialize the object, and then programmatically determines whether the object is compatible with the code even though the SUID values do not match. Preferably, this determination is made by consulting a stored mapping, in which the SUIDs of compatible versions have been recorded.
摘要:
Maintaining Multiple Valid Concurrent Serialized Object Versions Techniques are disclosed for concurrently maintaining serialized objects that were created from more than one version of a class definition. According to preferred embodiments, a component maps and enforces multiple valid stream-unique version identifiers (“SUIDs”) for a collection of class definitions (such as the classes of a software product that is undergoing change from one version to another). This component programmatically detects when an object's SUID value does not match the code attempting to deserialize the object, and then programmatically determines whether the object is compatible with the code even though the SUID values do not match. Preferably, this determination is made by consulting a stored mapping, in which the SUIDs of compatible versions have been recorded.
摘要:
Methods, systems, and computer program products for improving globalization of document content. A globalization model is defined which enables separating and externalizing translation-sensitive resources. A content translation expert can then operate efficiently to provide translated content, and a content designer can more easily focus on the task at hand using a resource-neutral document format. Using the disclosed techniques, translation-sensitive resources identified in a structured document can be programmatically translated by resolving references to a particular supplemental document in which the translated content for a target language has been specified.
摘要:
Techniques for enabling a validating parser to interpret a schema, where that schema may have been extended to multiple levels, and to perform the validation of a structured document according to the extended schema while still allowing a consumer application to request objects or events that are cast at some different level of the schema (including the base schema). Validating the source document according to an extended (i.e., more specific) schema enables improved detection of syntax errors. At the same time, casting objects and events from the parsed document to a level requested by the consumer application allows the consumer to receive only those objects or events for which it is adapted, without requiring the consumer application to include extra code to deal with objects or events it does not recognize in the parser's output. Preferably, the parser simply discards those objects or events which this consumer is not interested in receiving.
摘要:
Methods, systems, and computer program products for providing a heuristics service using a generically-consumable, reusable heuristics manager object. This heuristics manager object provides a “black box” approach to statistically-triggered heuristics, and eliminates the need to write application-specific code for compiling statistics and performing complicated analysis of those statistics within each application program. In one embodiment, the heuristics manager object is provided as a web-accessible service, which may be registered in a network-accessible registry such as a UDDI registry. Enterprises may subscribe to this service for monitoring and analyzing statistics pertaining to one or more of the enterprise's applications, thereby providing a novel method of doing business for the provider of the heuristics service.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to code reuse management and provide a method, system and computer program product for source code archival adapter for structured data mining In one embodiment of the invention, a method for adapting archived source code for structured data mining for source code reuse can be provided. The method can include parsing source code to identify individual classification elements within the source code, generating a markup language formatted set of code constructs corresponding to the classification elements, and storing the markup language formatted set of code constructs in a source code archive.
摘要:
A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
摘要:
A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
摘要:
A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.